D-Link DGS-3200-10 Product Manual - Page 183

Japanese Web-based Access Control (JWAC), JWAC Global Settings

Page 183 highlights

xStack® DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch Japanese Web-based Access Control (JWAC) The Japanese Web-based Access Contr ol (JWAC) f older c ontains fi ve windows: JWAC Gl obal Se ttings, JW AC Port Settings, JWAC User Settings, JWAC Customize Page Language, and JWAC Customize Page. JWAC Global Settings Users can enable and c onfigure Ja panese Web-based Access Control on th e Switch . Please note th at JWAC an d Web Authentication are m utually exclusi ve functions. That is, they cannot be ena bled at th e sam e time. To use the J WAC feat ure, computer users need to pass through two stages of authentication. The first stage is to do the authentication with the quarantine server an d th e secon d stag e is th e au thentication with the Switc h. Fo r the second stag e, t he au thentication is similar to Web Authentication, except that there is no port VLAN membership change by JWAC after a host passes authentication. The RADIUS server will share the server configuration defined by the 802.1X command set. To view the following window, click Security > Japanese Web-based Access Control (JWAC) > JWAC Global Settings: Figure 5 - 51. JWAC Global Settings window To set the Web authentication for the Switch, complete the following fields: Parameter Description JWAC State Use this drop-down menu to either enable or disable JWAC on the Switch. Authentication Failover Toggle between Enabled and Disabled. This is used to configure JWAC authentication failover. By default, the authentication failover is Disabled. If RADIUS servers are unreachable, the authentication will fail. When the authentication failover is Enabled, if RADIUS server authentication is unreachable, the local database will be used to do the authentication JWAC Configuration Virtual IP This parameter specifies the JWAC Virtual IP address that is used to accept authentication requests from an unauthenticated host. The Virtual IP address of JWAC is used to accept authentication requests from an unauthenticated host. Only requests sent to this IP will get a correct response. NOTE: This IP does not respond to ARP requests or ICMP packets. HTTP(s) Port (165535) This parameter specifies the TCP port that the JWAC Switch listens to and uses to finish the authenticating process. 170

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302

xStack
®
DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch
170
Japanese Web-based Access Control (JWAC)
The
Japanese Web-based Access Contr ol (JWAC)
f older c ontains fi ve windows:
JWAC Gl obal Se ttings
,
JW AC Port
Settings
,
JWAC User Settings
,
JWAC Customize Page Language
, and
JWAC Customize Page
.
JWAC Global Settings
Users can
enable and c
onfigure Ja panese Web-based Access Control on th e Switch . Please
note th at JWAC an
d Web
Authentication are m utually exclusi ve functions. That is, they cannot be ena bled at th e sam e time. To use the J WAC feat ure,
computer users need to pass through two stages of authentication. The first stage is to do the authentication with the quarantine
server an d th e secon d stag e is th e au thentication with the Switc h. Fo r the second stag e, t he au thentication is similar to
Web
Authentication, except that there is no port VLAN membership change by JWAC after a host passes authentication. The RADIUS
server will share the server configuration defined by the 802.1X command set.
To view the following window, click
Security
>
Japanese Web-based Access Control (JWAC)
>
JWAC Global Settings
:
Figure 5 - 51. JWAC Global Settings window
To set the Web authentication for the Switch, complete the following fields:
Parameter
Description
JWAC State
Use this drop-down menu to either enable or disable JWAC on the Switch.
Authentication
Failover
Toggle between
Enabled
and
Disabled
. This is used to configure JWAC authentication
failover. By default, the authentication failover is
Disabled
. If RADIUS servers are
unreachable, the authentication will fail. When the authentication failover is
Enabled
, if
RADIUS server authentication is unreachable, the local database will be used to do the
authentication
JWAC Configuration
Virtual IP
This parameter specifies the JWAC Virtual IP address that is used to accept authentication
requests from an unauthenticated host. The Virtual IP address of JWAC is used to accept
authentication requests from an unauthenticated host. Only requests sent to this IP will get a
correct response. NOTE: This IP does not respond to ARP requests or ICMP packets.
HTTP(s) Port (1-
65535)
This parameter specifies the TCP port that the JWAC Switch listens to and uses to finish the
authenticating process.